<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Gordon Taylor, Author at Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/author/gtholder/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/author/gtholder/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 12 Jun 2019 19:10:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Gordon Taylor, Author at Third Rock</title>
	<link>https://thirdrock.com/blog/author/gtholder/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>After the Risk Assessment, Then What? How Often Do I Need to Check?</title>
		<link>https://thirdrock.com/blog/2016/02/16/after-the-risk-assessment-then-what-how-often-do-i-need-to-check/</link>
		
		<dc:creator><![CDATA[Gordon Taylor]]></dc:creator>
		<pubDate>Tue, 16 Feb 2016 15:00:59 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[contingency plan]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[disaster recovery plan]]></category>
		<category><![CDATA[emergency response plan]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1286</guid>

					<description><![CDATA[<p>As we noted previously, there are numerous requirements for HIPAA compliance.  A follow-up question often heard is “How often do I have to do these things?” Risk assessments officially need [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/16/after-the-risk-assessment-then-what-how-often-do-i-need-to-check/">After the Risk Assessment, Then What? How Often Do I Need to Check?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As we noted <a href="http://thirdrock.com/blog/2016/01/22/hipaa-compliance-after-the-risk-assessment-then-what-data-protections/">previously</a>, there are numerous requirements for HIPAA compliance.  A follow-up question often heard is “How often do I have to do these things?”</p>
<p>Risk assessments officially need to be performed on an annual basis but regularly reviewing your risk remediation plan throughout the year is a business “best practice” for any organization.</p>
<p>Policies and Procedures need to be reviewed and changed depending upon federal law changes and changes in your organization.  New processes, new technologies, new locations may require revisions to your Policies and Procedures.</p>
<p>Monitoring of your networks and equipment needs to be done at least weekly for most organizations.  Any aberrations or irregularities in system configurations or file integrity identified in your networks or equipment should be addressed immediately.  Additionally, an inventory of your networks and equipment should be done at least annually with quarterly updates or after major IT procurements.</p>
<p>Privacy and security training should be done at least annually for all staff and with all new hires.  Any changes to the organization should be accompanied by refresher classes.  New employees need to be HIPAA trained within 30 Days.</p>
<p>Contingency plans should be reviewed annually, making sure plans and options for data back-up, disaster recovery, and emergency mode operation are all still viable strategies for the organization in the event of an interruption to the normal course of operations.</p>
<p>If you are interested in knowing where to start, try Third Rock’s <em><a href="http://cyberquickcheck.com">HIPAA Quick-Check</a></em>, This is a mini-risk assessment that will let you know very quickly your level of HIPAA compliance regarding the major areas of HIPAA(annual risk assessments, training, current policies and procedures, contingency plans, encryption of data, continuous monitoring of devices, etc.).  Remember, this is not a full risk assessment; it is just a <em>Quick-Check</em><sup>™</sup>.</p>
<p>Articles in the series:</p>
<ol>
<li><a href="http://thirdrock.com/blog/2015/11/12/hipaa-compliance-how-to-get-started/">How to get Started: Risk Assessment</a></li>
<li><a href="http://thirdrock.com/blog/2015/12/03/hipaa-compliance-after-the-risk-assessment-then-what-breach-detection/">Breach Detection</a></li>
<li><a href="http://thirdrock.com/blog/2016/01/07/hipaa-compliance-after-the-risk-assessment-then-what-hipaa-education/">Education</a></li>
<li><a href="http://thirdrock.com/blog/2016/01/22/hipaa-compliance-after-the-risk-assessment-then-what-data-protections/">Data Protections</a></li>
<li>Planning for Emergency Events</li>
<li>How Often Do I Need to Check? (This Article)</li>
</ol>
<p>Sign up for our <a href="https://visitor.r20.constantcontact.com/d.jsp?llr=v5sl766ab&amp;p=oi&amp;m=1131652959189&amp;sit=ngpsxi6mb&amp;f=14fea7b9-805f-4905-9999-3718234e4f7f">newsletter</a> on the right side of this page to learn more and stay informed about HIPAA and cyber security.</p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/16/after-the-risk-assessment-then-what-how-often-do-i-need-to-check/">After the Risk Assessment, Then What? How Often Do I Need to Check?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1286</post-id>	</item>
		<item>
		<title>After the Risk Assessment, Then What? Planning for Emergency Events</title>
		<link>https://thirdrock.com/blog/2016/02/12/after-the-risk-assessment-then-what-planning-for-emergency-events/</link>
		
		<dc:creator><![CDATA[Gordon Taylor]]></dc:creator>
		<pubDate>Fri, 12 Feb 2016 14:45:13 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[contingency plan]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[disaster recovery plan]]></category>
		<category><![CDATA[emergency response plan]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1282</guid>

					<description><![CDATA[<p>As we noted previously, there are numerous requirements for HIPAA compliance.  Being prepared for future emergency events is often identified in the Risk Assessment as a HIPAA compliance requirement that [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/12/after-the-risk-assessment-then-what-planning-for-emergency-events/">After the Risk Assessment, Then What? Planning for Emergency Events</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As we noted <a href="http://thirdrock.com/blog/2016/01/22/hipaa-compliance-after-the-risk-assessment-then-what-data-protections/">previously</a>, there are numerous requirements for HIPAA compliance.  Being prepared for future emergency events is often identified in the Risk Assessment as a HIPAA compliance requirement that needs to be addressed.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class=" wp-image-197 alignleft" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/2014/03/disaster_ahead_200.jpg?resize=247%2C185&#038;ssl=1" alt="Disaster Ahead" width="247" height="185" />Preparing for future events is often overlooked by many healthcare entities.  Just dealing with the issues of the day can take up the majority of your time.  However, being prepared for future events, besides being a HIPAA requirement, also makes good business sense.</p>
<p>What HIPAA calls “Contingency Planning” is what most businesses call “business continuity/disaster recovery.”  Continued daily operations – data back-up, disaster recovery, and emergency mode operation are all required by HIPAA.  The testing of these contingency plans is highly recommended.  All of these are elements of business continuity/disaster recovery.</p>
<p>Planning for unexpected, natural or man-made disasters, allows your business to be prepared for such potential events.  Other things to consider include:</p>
<ul>
<li>Emergency Plans vs. Disaster Recovery Plans</li>
<li>Remote collocations make life easier.</li>
<li>The cloud makes data storage easier.</li>
<li>Move to secure, encrypted local, remote (co-lo) and cloud backups.</li>
<li>Have a diagram of the top two tiers of applications, the servers, and networks to recover them.</li>
<li>Auto failover simplifies testing, just fail over quarterly to your backup location.</li>
</ul>
<p>With high-speed networks, remote locations, co-location data centers, and cloud services – it is now far easier to plan for disaster recovery as you roll-out new hardware and services.</p>
<p>In addition to Contingency Planning, <strong>Breach Awareness/Notification Planning</strong> needs to be in place as well.  In the event of a data breach involving unsecured PHI, there are requirements regarding</p>
<ul>
<li>the notification of individuals whose PHI has been breached,</li>
<li>time frames for such notification,</li>
<li>manner of notification,</li>
<li>and content of information contained in the notification.</li>
<li>If the breach involved more than 500 individuals in one state, notices to the media are required.</li>
<li>In most cases, notification to the federal Department of Health and Human Services (HHS)  is required.</li>
</ul>
<p>Having a plan in place ahead of time to address all of these requirements is essential to a healthcare entity.  Here&#8217;s an outline from our Disaster Recovery Plan to help you get started.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-full wp-image-367" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/BCDR_Plan_Diagram.png?resize=588%2C583&#038;ssl=1" alt="BCDR_Plan_Diagram" width="588" height="583" /></p>
<p>If you are interested in knowing where to start, try Third Rock’s <em><a href="http://cyberquickcheck.com">HIPAA Quick-Check</a></em>, This is a mini-risk assessment that will let you know very quickly your level of HIPAA compliance regarding the major areas of HIPAA(annual risk assessments, training, current policies and procedures, contingency plans, encryption of data, continuous monitoring of devices, etc.).  Remember, this is not a full risk assessment; it is just a <em>Quick-Check</em><sup>™</sup>.</p>
<p>Articles in the series:</p>
<ol>
<li><a href="http://thirdrock.com/blog/2015/11/12/hipaa-compliance-how-to-get-started/">How to get Started: Risk Assessment</a></li>
<li><a href="http://thirdrock.com/blog/2015/12/03/hipaa-compliance-after-the-risk-assessment-then-what-breach-detection/">Breach Detection</a></li>
<li><a href="http://thirdrock.com/blog/2016/01/07/hipaa-compliance-after-the-risk-assessment-then-what-hipaa-education/">Education</a></li>
<li><a href="http://thirdrock.com/blog/2016/01/22/hipaa-compliance-after-the-risk-assessment-then-what-data-protections/">Data Protections</a></li>
<li>Planning for Emergency Events (This Article)</li>
</ol>
<p>Sign up for our <a href="https://visitor.r20.constantcontact.com/d.jsp?llr=v5sl766ab&amp;p=oi&amp;m=1131652959189&amp;sit=ngpsxi6mb&amp;f=14fea7b9-805f-4905-9999-3718234e4f7f">newsletter</a> on the right side of this page to learn more and stay informed about HIPAA and cyber security.</p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/12/after-the-risk-assessment-then-what-planning-for-emergency-events/">After the Risk Assessment, Then What? Planning for Emergency Events</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1282</post-id>	</item>
		<item>
		<title>HIPAA Compliance – After the Risk Assessment, Then What?  HIPAA Education</title>
		<link>https://thirdrock.com/blog/2016/01/07/hipaa-compliance-after-the-risk-assessment-then-what-hipaa-education/</link>
		
		<dc:creator><![CDATA[Gordon Taylor]]></dc:creator>
		<pubDate>Thu, 07 Jan 2016 15:00:58 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA Education]]></category>
		<category><![CDATA[HIPAA fines]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1182</guid>

					<description><![CDATA[<p>As we noted previously, there are numerous requirements for HIPAA compliance.   The next step we would suggest is HIPAA Training.  The Education of your staff regarding what is HIPAA and [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/01/07/hipaa-compliance-after-the-risk-assessment-then-what-hipaa-education/">HIPAA Compliance – After the Risk Assessment, Then What?  HIPAA Education</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As we noted <a href="http://thirdrock.com/blog/2015/12/03/hipaa-compliance-after-the-risk-assessment-then-what-breach-detection/">previously</a>, there are numerous requirements for HIPAA compliance.   The next step we would suggest is HIPAA Training.  The Education of your staff regarding what is HIPAA and what does it require is top priority and government requirement.  This education can be training classes as well as knowledge of your<br />
organization’s policies and procedures.</p>
<ul>
<li><strong>Staff Training:</strong> HIPAA Privacy and Security Training, for all employees, is required to be done soon after initial employment and then periodically thereafter.</li>
<li><strong>Officer Training:</strong> In-depth HIPAA courses are required for your organization’s HIPAA Privacy and Security Officers.</li>
<li><strong>P&amp;P Based:</strong> HIPAA training must complement your organization’s HIPAA policies and procedures.</li>
<li><strong>Current: </strong>HIPAA refresher classes should as needed to keep staff informed about material changes in HIPAA policies and procedures.</li>
<li><strong>Documented: </strong>You must document each individual employee’s HIPAA training.</li>
</ul>
<p>A current set of HIPAA Policies and Procedures provides you a source of education through guidance to staff as to what they can and cannot do regarding HIPAA activities.  These policies and procedures should address all aspects of an organization’s healthcare activities.</p>
<ul>
<li>What you can say?</li>
<li>Who you can say it to?</li>
<li>Access to healthcare data?</li>
<li>With whom you can share that data?</li>
<li>What needs to be encrypted?</li>
<li>What happens if there is a breach?</li>
<li>What happens if electrical power is lost or there is a natural disaster?</li>
<li>And a myriad of other healthcare activities that involve protecting healthcare information.</li>
</ul>
<p>If you are interested in knowing where to start, try Third Rock’s <em>HIPAA Quick-Check</em> (<a href="http://cyberquickcheck.com/">http://cyberquickcheck.com/</a>), which is a mini-risk assessment that will let you know very quickly your level of HIPAA compliance regarding the major areas of HIPAA compliance.</p>
<p>Articles in the series:</p>
<ol>
<li><a href="http://thirdrock.com/blog/2015/11/12/hipaa-compliance-how-to-get-started/">How to get Started: Risk Assessment</a></li>
<li><a href="http://thirdrock.com/blog/2015/12/03/hipaa-compliance-after-the-risk-assessment-then-what-breach-detection/">Breach Detection</a></li>
<li>Education</li>
</ol>
<p>The post <a href="https://thirdrock.com/blog/2016/01/07/hipaa-compliance-after-the-risk-assessment-then-what-hipaa-education/">HIPAA Compliance – After the Risk Assessment, Then What?  HIPAA Education</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1182</post-id>	</item>
		<item>
		<title>HIPAA Compliance – After the Risk Assessment, Then What? Breach Detection</title>
		<link>https://thirdrock.com/blog/2015/12/03/hipaa-compliance-after-the-risk-assessment-then-what-breach-detection/</link>
		
		<dc:creator><![CDATA[Gordon Taylor]]></dc:creator>
		<pubDate>Thu, 03 Dec 2015 15:00:49 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA fines]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1158</guid>

					<description><![CDATA[<p>As we noted previously, there are numerous requirements for HIPAA compliance.  A top priority after the risk assessment is cyber security to prevent and detect cyber breaches. In this age [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2015/12/03/hipaa-compliance-after-the-risk-assessment-then-what-breach-detection/">HIPAA Compliance – After the Risk Assessment, Then What? Breach Detection</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As we noted <a href="http://thirdrock.com/blog/2015/11/12/hipaa-compliance-how-to-get-started/">previously</a>, there are numerous requirements for HIPAA compliance.  A top priority after the risk assessment is cyber security to prevent and detect cyber breaches.</p>
<p>In this age of data breaches – from cyber breaches to equipment theft/loss, addressing the issue of continuous monitoring of your network and your networked devices might be the second item to address on your list of HIPAA compliance activities.  The Office of Civil Rights (DHHS) states that security is now 80% of the requirements of compliance and protecting the PHI is the goal.</p>
<p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber-attack-c707671_s.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1134 size-full" style="margin-bottom: 10px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber-attack-c707671_s.jpg?resize=267%2C200&#038;ssl=1" alt="Cyber Attack - Red Color Text on Dark Digital Background." width="267" height="200" /></a></p>
<p>The key to preventing a serious/significant PHI/ePHI data loss is to quickly identify and remediate data breaches.  The quick identification of a breach in any of its forms is the most important aspect of securing your data.  Most cyber thieves need time to attack and get into your systems and equipment; even more time to root around in your networks and files looking for valuable data; and then even more time to collect and distribute the stolen data.  Anything that reduces these time frames lessens the potential damage due to data theft.</p>
<p>Begin with a Weekly Review of your systems and software for Unauthorized Changes (or authorized changes that did not occur).  Early detection of unauthorized changes to your systems, software, and equipment can reduce the impact of malicious software code (malware) might have on your valuable ePHI data.</p>
<p>A Weekly Review of your systems and equipment compliance profiles can also reduce your vulnerability to outside attacks. This process strengthens your system and software against any future attacks by continuously maintaining compliance standards.</p>
<p>Regular Inventory reviews of all computer-related equipment is necessary to identify any theft, loss, or new additions to your network.  If you do not know what equipment you have, you certainly cannot know what information you might have lost.  Likewise, new equipment on your networks that is not properly configured can leave you vulnerable to breach attacks.</p>
<p>Continuously monitoring your systems and computer equipment will allow you to quickly identify any anomalies and proactively address any irregularities, thereby protecting your valuable ePHI data.</p>
<p>To address these issues, Third Rock offers <em>Third Rock Assurance</em><sup>™</sup>, which provides continuous monitoring of your networks and networked devices.  All types of devices (servers, desktops, network devices, databases, storage systems, virtualization infrastructures, and mobile devices ) can be monitored for vulnerabilities, compliance, and changes (authorized and unauthorized), which can be scheduled to run nightly, weekly, or monthly.  Go to  <a href="https://thirdrock.com/compliance-solutions/continuous-compliance-monitoring/">https://thirdrock.com/compliance-solutions/continuous-compliance-monitoring/</a> for more information about continuous monitoring.</p>
<p>If you are interested in knowing where to start, try Third Rock’s <em>HIPAA Quick-Check</em> (<a href="http://cyberquickcheck.com/">http://cyberquickcheck.com/</a>), which is a mini-risk assessment that will let you know very quickly your level of HIPAA compliance.</p>
<p>Articles in the series:</p>
<ol>
<li><a href="http://thirdrock.com/blog/2015/11/12/hipaa-compliance-how-to-get-started/">How to get Started: Risk Assessment</a></li>
<li>Breach Detection</li>
<li><a href="http://thirdrock.com/blog/2016/01/07/hipaa-compliance-after-the-risk-assessment-then-what-hipaa-education/">Education</a></li>
</ol>
<p>The post <a href="https://thirdrock.com/blog/2015/12/03/hipaa-compliance-after-the-risk-assessment-then-what-breach-detection/">HIPAA Compliance – After the Risk Assessment, Then What? Breach Detection</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1158</post-id>	</item>
		<item>
		<title>HIPAA Compliance &#8211; How to Get Started?</title>
		<link>https://thirdrock.com/blog/2015/11/12/hipaa-compliance-how-to-get-started/</link>
		
		<dc:creator><![CDATA[Gordon Taylor]]></dc:creator>
		<pubDate>Thu, 12 Nov 2015 15:00:12 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ePHI. compliance]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA remediation]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1145</guid>

					<description><![CDATA[<p>You may have asked yourself – how HIPAA compliant are we really?  What constitutes HIPAA compliance?  How often do I need to check? There are numerous requirements for HIPAA compliance [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2015/11/12/hipaa-compliance-how-to-get-started/">HIPAA Compliance &#8211; How to Get Started?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You may have asked yourself – how HIPAA compliant are we really?  What constitutes HIPAA compliance?  How often do I need to check?</p>
<p>There are numerous requirements for HIPAA compliance – performing an annual risk assessment, up-to-date training, maintaining current policies and procedures, having a contingency plan, having your data encrypted at rest and in motion, continuous monitoring of all networks and networked devices, just to name a few.</p>
<p>Those are a lot of things to contend with but where should you start?  As Maria says in “The Sound of Music,” you start at the very beginning.  For HIPAA compliance, it is the Risk Assessment.  The risk assessment will let you know where you stand on all matters related to HIPAA compliance.</p>
<p>In fact, the U.S. Department of Health and Human Services’ Office of Civil Rights (the entity entrusted with HIPAA compliance) agrees.  As a result of their first round of federal HIPAA audits and in all of their investigations of HIPAA compliance, what the OCR noticed as the number one problem behind a HIPAA breach or a bad HIPAA Compliance audit was the lack of a current HIPAA risk assessment.  The OCR has also stated that in their next round of HIPAA audits, which began in 2015, they are concentrating on the covered entities’ risk assessment (or lack thereof).</p>
<p>Performing a HIPAA risk assessment can be daunting task (generally the reason they are not being done in the first place).  If your company has annual revenues of more than $5 million dollars, your “official” risk assessment needs to be done by a third-party.  If your company’s annual revenues are less than $5 million, you can perform a self-administered risk assessment.  In either case, the risk assessment is the place to start.</p>
<p>At Third Rock, we have further simplified this process regarding the risk assessment.  We have created the Third Rock <em><a href="http://cyberquickcheck.com/" target="_blank" rel="noopener noreferrer">HIPAA Quick-Check</a></em> . This is a mini-risk assessment that will let you know very quickly your level of HIPAA compliance regarding the major areas of HIPAA(annual risk assessments, training, current policies and procedures, contingency plans, encryption of data, continuous monitoring of devices, etc.).  Remember, this is not a full risk assessment; it is just a <em>Quick-Check</em><sup>™</sup>.</p>
<p>If your organization decides to pursue a complete, official risk-assessment, Third Rock can perform these services for you – we provide both self-assessments as well as third-party assessments, depending upon your company’s size.  After the risk assessment is performed, you will receive the results of your HIPAA Risk Assessment and a Risk Remediation plan to address any shortcomings.  Plus, we’ll help you step-by-step through the remediation identified in the risk assessment.</p>
<p>And that’s how you get started.</p>
<p><a href="http://bit.ly/212PDej">Read the next post in the HIPAA Compliance series.</a></p>
<p>Additional Resources:</p>
<ol>
<li>Third Rock’s HIPAA and Cyber-Security Blog</li>
<li>Third Rock’s HIPAA and Cyber-Security Newsletter &amp; Subscription page</li>
<li>Third Rock – Webinar Video</li>
</ol>
<p>The post <a href="https://thirdrock.com/blog/2015/11/12/hipaa-compliance-how-to-get-started/">HIPAA Compliance &#8211; How to Get Started?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1145</post-id>	</item>
		<item>
		<title>Protecting Yourself from a Cyber Breach (3 of 3)</title>
		<link>https://thirdrock.com/blog/2015/09/17/protecting-yourself-from-a-cyber-breach-3-of-3/</link>
		
		<dc:creator><![CDATA[Gordon Taylor]]></dc:creator>
		<pubDate>Thu, 17 Sep 2015 14:00:21 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1001</guid>

					<description><![CDATA[<p>This article is the third in a three-part series from Third Rock, a leading HIPAA Compliance and Risk Management provider, describing various methods to help protect your healthcare organization from [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2015/09/17/protecting-yourself-from-a-cyber-breach-3-of-3/">Protecting Yourself from a Cyber Breach (3 of 3)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/c758703_s-compressor.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1036 size-full" style="margin-bottom: 10px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/c758703_s-compressor.jpg?resize=200%2C200&#038;ssl=1" alt="c758703_s-compressor" width="200" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/c758703_s-compressor.jpg?w=200&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/c758703_s-compressor.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/thirdrock.com/wp-content/uploads/c758703_s-compressor.jpg?resize=160%2C160&amp;ssl=1 160w" sizes="(max-width: 200px) 100vw, 200px" /></a>This article is the third in a three-part series from Third Rock, a leading HIPAA Compliance and Risk Management provider, describing various methods to help protect your healthcare organization from breaches, and cyber-breaches in particular.</p>
<p>Last week, we highlighted the financial impact of a cyber-breach for a healthcare organization and why it is so important to protect your data from breaches.&nbsp; Today’s article will look at the two most significant approaches towards protecting your organization from costly breaches – <strong>Prevention</strong> and <strong>Detection</strong>.</p>
<p><strong><u>Preventing a Breach</u></strong> lays the groundwork for protecting valuable Protected Health Information (PHI) and ePHI, by taking proactive steps to prevent breaches from taking place altogether.&nbsp; The more effort undertaken to fortify your defenses reduces the potential of costly breaches later on.&nbsp; Here are some actions to take that can help your organization prevent a breach from taking place:</p>
<ul>
<li>Completing the required <strong>Annual HIPAA Risk Assessment</strong> is the first step in protecting your organization from a breach. This process performs two critical tasks – first, it identifies all PHI, where it is stored and how it is transmitted and secondly, the Risk Assessment identifies weaknesses or vulnerabilities that may exist in both the electronic and physical worlds.&nbsp; Deficiencies in your defenses are then prioritized and then your team can begin to remediate them in a logical and efficient manner.&nbsp; In fact, the Office of Civil Rights (OCR) of the Department of Health and Human Services, states that the annual risk assessment is the first thing they look for in an audit or a review of a breach.</li>
<li>Creating<strong> Useful and Useable Policies and Procedures</strong> that reflect the most current HIPAA Privacy and Security regulations and that are based upon how your organization does business. They should also be written in an easy to understand format so your employees can understand and implement them. &nbsp;If these two requirements are not met, they will not be adopted and implemented successfully, leaving your business vulnerable and non-compliant.</li>
<li>Incorporating<strong> Practical and Up-to-date Training</strong>, which is required by HIPAA Privacy and Security rules, enables staff to learn the current requirements pertaining to HIPAA Privacy and Security regulations, thereby further protecting PHI and ePHI in the workplace.</li>
<li><strong>Encrypting Data</strong>, both at rest and in motion, prevents breached data from being recovered by cyber thieves since the breached data is rendered as unreadable without the correct encryption “key.”</li>
<li>Using<strong> Security Software</strong> (Norton, McAfee, ESET, etc.) to help prevent malware, phishing, viruses, and other computer vulnerabilities from entering your computer systems and devices.</li>
</ul>
<p>Unfortunately, breach prevention activities are not enough. &nbsp;As recent headlines have shown, cyber-breaches are happening with greater frequency and voracity.&nbsp; Should a breach occur, <strong><u>Detecting the Breach</u></strong> in a timely manner becomes the key factor in mitigating any damages due to the breach.&nbsp; The sooner you can detect and correct the breach, the greater your protection of PHI and ePHI.</p>
<p>All types of devices (servers, desktops, printers, network devices, databases, storage systems, virtualization infrastructures, mobile devices, etc.) need to be regularly monitored for vulnerabilities, compliance, and changes (both known and unknown).</p>
<ul>
<li><strong>Vulnerability Assessment</strong> provides detection and reporting of known vulnerabilities on your systems that have not been corrected.&nbsp; Software hackers continually search for ways to penetrate computer defenses and a vulnerability assessment hardens your defenses against such attacks.</li>
<li><strong>Continuous Compliance</strong> includes policies that you can use to ensure continuous compliance with regulatory standards such as HIPAA, PCI-DSS, NIST 800-53, SOX, NERC, and FDCC.</li>
<li><strong>File Integrity Verification </strong>is a fast and reliable process to verify the software deployed on your systems is valid, current, and properly deployed, and has not been infected or altered by malicious software. It also identifies any software that should not be on your network.</li>
</ul>
<p>The use of such <strong>Breach Detection Tools</strong> both hardens your computer system’s defenses making your systems less likely to be compromised, and greatly reduces detection time if a breach should occur.&nbsp; These tools provide exceptional visibility and reporting into the compliance and security of your computer systems network, which significantly reduces your organizations liabilities.</p>
<p>In order to help your organization reduce the possibility of being breached and limit the financial impact if breached, Third Rock is offering a Free Cyber Security/Breach Assessment for the first 50 organizations that contact us.&nbsp; All we need to know is the name of the healthcare organization and the contact information for the individual(s) responsible for HIPAA/Information Technology compliance.&nbsp; Send this contact information to <a href="mailto:info@thirdrock.com">info@thirdrock.com</a> or call us at 512-310-0020.</p>
<p>For more information on Third Rock’s Worry-Free Compliance, please visit us at <a href="http://www.thirdrock.com">www.thirdrock.com</a>.</p>
<p>The post <a href="https://thirdrock.com/blog/2015/09/17/protecting-yourself-from-a-cyber-breach-3-of-3/">Protecting Yourself from a Cyber Breach (3 of 3)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1001</post-id>	</item>
		<item>
		<title>Impact of a Healthcare Breach (2 of 3)</title>
		<link>https://thirdrock.com/blog/2015/09/10/impact-of-a-healthcare-breach-2-of-3/</link>
		
		<dc:creator><![CDATA[Gordon Taylor]]></dc:creator>
		<pubDate>Thu, 10 Sep 2015 13:15:06 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA fines]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[liability]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=999</guid>

					<description><![CDATA[<p>This article is the second in a three-part series from Third Rock, a leading HIPAA Compliance and Risk Management provider, that highlights the financial impact of a cyber-breach for healthcare [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2015/09/10/impact-of-a-healthcare-breach-2-of-3/">Impact of a Healthcare Breach (2 of 3)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/burningin_money.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-1022" style="margin-bottom: 10px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/burningin_money.jpg?resize=200%2C192&#038;ssl=1" alt="burningin_money" width="200" height="192" /></a>This article is the second in a three-part series from Third Rock, a leading HIPAA Compliance and Risk Management provider, that highlights the financial impact of a cyber-breach for healthcare organizations and why it is so important to protect your healthcare data.</p>
<p>The impact from a healthcare breach has wide and significant impact to a healthcare organization, both small and large.  Here are some examples of the costs associated with healthcare breaches:</p>
<ul>
<li><strong>Negative media/publicity</strong> is one of the first and possibly the most devastating negative impacts of a healthcare breach – current and potential customers will be unlikely to use a healthcare organization that cannot protect their sensitive information, particularly ePHI.</li>
<li>The <strong>Cost to Remediate the breach</strong> is often the second noticeable impact of a breach.
<ul>
<li>First there is the <u>Triage Costs</u> of the breach itself – bringing in forensic teams to investigate the breach – the how, what, and where issues; implementing business continuity and back-up plans; and bringing in extra IT staff to restore/repair corrupted data and implement the necessary security safeguards.</li>
<li>Second, there are the <u>Clean-up Costs</u> for all of the identities of the people affected by the breach. The estimated cost to clean-up such records is around $18,000 per individual.</li>
</ul>
</li>
<li><strong>Consumer class action lawsuits</strong> are often the next cost of a breach. Target and Home Depot are contending with numerous consumer class action lawsuits (Target: 140+ and Home Depot: 44) while Healthcare insurer Anthem is just beginning to see consumer lawsuits being filed in numerous states.  Target has recently offered a proposed settlement of $10 million for their class action lawsuits.</li>
</ul>
<p>All of the items above will lead to lost revenues, increased costs, and reduced profits.</p>
<ul>
<li>There is one more cost to a healthcare breach – <strong>HIPAA Fines</strong>, which can range from $100 to $50,000 per breached record, depending upon the level of HIPAA compliance and awareness of HIPAA privacy and security requirements by the healthcare organization.</li>
</ul>
<p>As healthcare organizations become more automated, connected to the internet, and implement more EHR/EMR systems and other electronic data exchanges, the opportunity for cyber breaches will only increase.</p>
<p>Next week’s article will discuss what you can do to reduce the possibility of a cyber-security breach and how you can protect your organization now.  At the end of this series on cyber security breaches, Third Rock will be a special offer for those organizations ready to improve their protection against cyber-breaches.</p>
<p>For more information on Third Rock’s Worry-Free Compliance, please visit us at: <a href="http://www.thirdrock.com">www.thirdrock.com</a>.</p>
<p>The post <a href="https://thirdrock.com/blog/2015/09/10/impact-of-a-healthcare-breach-2-of-3/">Impact of a Healthcare Breach (2 of 3)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">999</post-id>	</item>
		<item>
		<title>Cyber Breach – No One is Immune</title>
		<link>https://thirdrock.com/blog/2015/09/01/cyber-breach-no-one-is-immune/</link>
					<comments>https://thirdrock.com/blog/2015/09/01/cyber-breach-no-one-is-immune/#comments</comments>
		
		<dc:creator><![CDATA[Gordon Taylor]]></dc:creator>
		<pubDate>Tue, 01 Sep 2015 14:45:09 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security alert]]></category>
		<category><![CDATA[strategy]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=994</guid>

					<description><![CDATA[<p>This article is the first in a three-part series from Third Rock, a leading HIPAA Compliance and Risk Management provider, explaining the magnitude and business impact of cyber security breaches [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2015/09/01/cyber-breach-no-one-is-immune/">Cyber Breach – No One is Immune</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/shot_billb.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-995 size-medium" style="margin-bottom: 10px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/shot_billb.jpg?resize=300%2C225&#038;ssl=1" alt="shot_billb" width="300" height="225" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/shot_billb.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/shot_billb.jpg?w=500&amp;ssl=1 500w" sizes="(max-width: 300px) 100vw, 300px" /></a>This article is the first in a three-part series from Third Rock, a leading HIPAA Compliance and Risk Management provider, explaining the magnitude and business impact of cyber security breaches as well as steps you can take to protect your records and your organization.</p>
<p>Recent headlines have reported that cyber breaches are occurring with greater frequency than ever before. Everyone is familiar with the cyber breaches of Target, Home Depot, JP Morgan, Sony, and most recently, the federal Office of Personnel Management. Over 230 million people were affected by these five breaches alone! One of these breaches may have personally affected you.</p>
<p>In 2015, healthcare companies have increasingly become the target of cyber thieves. Anthem BCBS, Premera, and UCLA Health alone have accounted for over <strong>103.1 million healthcare records being compromised</strong> in just the first six months of 2015! To put this in perspective, in all of 2014, there were 333 healthcare breaches (almost one a day) affecting 8.3 million records.</p>
<p>So why the increased interest in healthcare records by cyber thieves? First, the introduction of security chips has made credit cards more difficult to abuse. Additionally, the value of a credit card is limited to the available spending limit on the card and that a credit card can be easily cancelled if compromised. The second, and more compelling reason is that healthcare records have unlimited theft potential and they are easier to obtain. A complete healthcare record includes a person’s name, address, phone number, birth date, social security number, insurance numbers – everything a cyber thief needs to steal someone’s identity. With this information, an identity thief can apply for an unlimited number of credit cards, car loans, mortgages, etc. In other words, healthcare records are much more valuable to cyber thieves on the black market than credit cards.</p>
<p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-services-1.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-834" style="margin-top: 10px; margin-bottom: 10px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-services-1.jpg?resize=200%2C200&#038;ssl=1" alt="Breach Repair Services" width="200" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-services-1.jpg?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-services-1.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-services-1.jpg?resize=160%2C160&amp;ssl=1 160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-services-1.jpg?w=500&amp;ssl=1 500w" sizes="(max-width: 200px) 100vw, 200px" /></a>But why are healthcare records easier to obtain? Many healthcare organizations have been slow to improve the security of the protected health information (PHI) in their possession. While financial and business entities have increased their security spending in light of increased cyber-attacks, most healthcare organizations have not. Cyber thieves know this and are now exploiting this vulnerability, as evidenced by the 1175 percent increase in breached healthcare records so far in 2015.</p>
<p>HIPAA was significantly amended in 2009, in part, to address these security concerns, but many healthcare organizations have not yet implemented the required safeguards. This is where Third Rock’s Worry-Free Compliance solutions can help.</p>
<p>Next week’s article will discuss the financial impact of a cyber-breach for an organization and why it is so important to protect your data now. At the end of this series on cyber security breaches.</p>
<p>For more information on Third Rock’s Worry-Free Compliance, please visit us at: <a href="http://www.thirdrock.com">www.thirdrock.com</a></p>
<p>The post <a href="https://thirdrock.com/blog/2015/09/01/cyber-breach-no-one-is-immune/">Cyber Breach – No One is Immune</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thirdrock.com/blog/2015/09/01/cyber-breach-no-one-is-immune/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">994</post-id>	</item>
	</channel>
</rss>
